Digital Signature For Text File

Authors

  • Ayad Ibrahim Abdulsada Dept. of Computer Science, College of Education, University of Basrah, Basrah, Iraq.

Keywords:

Computer security, Digital signatures, Public key cryptography, Hash functions.

Abstract

Digital signatures are used to detect unauthorized modifications to data and to
authenticate the identity of the signatory. In addition, the recipient of signed data can
use a digital signature as evidence in demonstrating to a third party that the signature
was, in fact, generated by the claimed signatory. This is known as non-repudiation,
since the signatory cannot easily repudiate the signature at a later time. In this paper,
an algorithm for signing text file has been presented. The famous RSA public key
algorithm and SHA-l(Secure Hash Algorithm) hash function are used to generate the
digital signature of a text file. Our algorithm consist of two parts: signature generation
and signature verification. Many experiments tested to examine the security of the
presented work.

Downloads

Download data is not yet available.

Downloads

Published

2017-09-10

How to Cite

Ibrahim Abdulsada, A. (2017). Digital Signature For Text File. Journal of Al-Qadisiyah for Computer Science and Mathematics, 2(2), 128–139. Retrieved from https://jqcsm.qu.edu.iq/index.php/journalcm/article/view/228

Issue

Section

Math Articles